An Efficient Hash-based RFID Grouping Authentication Protocol Providing Missing Tags Detection
暂无分享,去创建一个
Sung Bum Pan | Haowen Tan | Dongmin Choi | Pankoo Kim | Ilyong Chung | Dongmin Choi | I. Chung | S. Pan | Haowen Tan | Pankoo Kim
[2] Elyes Ben Hamida,et al. Behavior of wireless body-to-body networks routing strategies for public protection and disaster relief , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[3] Yu-Jung Huang,et al. Efficient Implementation of RFID Mutual Authentication Protocol , 2012, IEEE Transactions on Industrial Electronics.
[4] Victor C. M. Leung,et al. An Authenticated Trust and Reputation Calculation , 2017 .
[5] Jian Shen,et al. An Enhanced Grouping Proof for Multiple RFID Readers and Tag Groups , 2014 .
[6] Jung-Hui Chiu,et al. Reading order independent grouping proof for RFID tags , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[7] Said Rakrak,et al. From RFID tag ID to IPv6 address mapping mechanism , 2015, 2015 Third International Workshop on RFID And Adaptive Wireless Sensor Networks (RAWSN).
[8] Shigeng Zhang,et al. Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.
[9] Chih-Chung Lin,et al. Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags , 2007, APWeb/WAIM Workshops.
[10] Luca Catarinucci,et al. Improved Battery-Less Augmented RFID Tag: Application on Ambient Sensing and Control , 2016, IEEE Sensors Journal.
[11] Noël Crespi,et al. Smart cross-layer protocol integration for efficient wireless communications , 2015, Int. J. Ad Hoc Ubiquitous Comput..
[12] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[13] Zhi Chen,et al. Cooperative spectrum sensing based on side information for cognitive radio sensor networks in internet of things applications , 2016, Int. J. Internet Protoc. Technol..
[14] Kyung Sup Kwak,et al. On maximising tag reading efficiency of a multi-packet reception capable radio frequency identification reader , 2015, IET Commun..
[15] Tzong-Chen Wu,et al. Ownership transfer protocol for RFID objects using lightweight computing operators , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[16] Djamel Djenouri,et al. Car park management with networked wireless sensors and active RFID , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).
[17] Min Chen,et al. An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[18] Da-Zhi Sun,et al. A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.
[19] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[20] Ge Yu,et al. A Simulation Platform for RFID Application Deployment Supporting Multiple Scenarios , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[21] Hung-Yu Chien,et al. Tree-Based RFID Yoking Proof , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[22] Hossam S. Hassanein,et al. Tag Modulation Silencing: Design and Application in RFID Anti-Collision Protocols , 2014, IEEE Transactions on Communications.
[23] Selwyn Piramuthu,et al. On Existence Proofs for Multiple RFID Tags , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.
[24] Madhumita Kathuria,et al. Reliable delay sensitive loss recovery protocol for critical health data transmission system , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).
[25] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[26] Lihua Ruan,et al. SmartBAN With Periodic Monitoring Traffic: A Performance Study on Low Delay and High Energy Efficiency , 2018, IEEE Journal of Biomedical and Health Informatics.
[27] Leonid Bolotnyy,et al. Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[28] Laurence T. Yang,et al. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[29] Jian Shen,et al. An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .
[30] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[31] Jian Shen,et al. A lightweight and practical RFID grouping authentication protocol in multiple-tag arrangements , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).
[32] Weidong Wang,et al. Code division cooperative identification reader anti-collision protocol in smart RFID systems , 2012, 2012 19th International Conference on Telecommunications (ICT).
[33] Abbas Jamalipour,et al. A Probabilistic Energy-Aware Routing Protocol for Wireless Body Area Networks , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).
[34] N. S. Hoang,et al. A Low-Cost , 1997 .
[35] H. T. Mouftah,et al. Authentication mechanism for mobile RFID based Smart grid network , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[36] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[37] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[38] Riqing Chen,et al. RFID-based stent-graft dynamic assessment for health cares , 2017, IET Networks.
[39] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.